Skip to main content

CVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork

Medium
VulnerabilityCVE-2025-7684cvecve-2025-7684cwe-352
Published: Sat Aug 16 2025 (08/16/2025, 03:38:48 UTC)
Source: CVE Database V5
Vendor/Project: remysharp
Product: Last.fm Recent Album Artwork

Description

The Last.fm Recent Album Artwork plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to missing or incorrect nonce validation on the 'lastfm_albums_artwork.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/16/2025, 04:04:56 UTC

Technical Analysis

CVE-2025-7684 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Last.fm Recent Album Artwork WordPress plugin developed by remysharp. This vulnerability affects all versions up to and including 1.0.2. The root cause is the absence or improper implementation of nonce validation on the 'lastfm_albums_artwork.php' page. Nonces are security tokens used to verify that requests made to a web application are intentional and authorized by the user. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated administrator (for example, by clicking a link or visiting a malicious webpage), causes the plugin to update its settings or inject malicious scripts. This can lead to unauthorized changes in the plugin’s configuration and potentially enable further attacks such as persistent cross-site scripting (XSS). The vulnerability is exploitable remotely without authentication but requires user interaction (the administrator must be tricked into performing an action). The CVSS v3.1 base score is 6.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact includes limited confidentiality and integrity loss, with no direct availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant because WordPress is widely used, and plugins like Last.fm Recent Album Artwork are common in sites that integrate music-related content, making this a relevant threat vector for website administrators.

Potential Impact

For European organizations, especially those operating WordPress-based websites with the Last.fm Recent Album Artwork plugin installed, this vulnerability poses a risk of unauthorized configuration changes and potential injection of malicious scripts. This can lead to compromised website integrity, defacement, or the delivery of malicious payloads to site visitors, which could damage brand reputation and user trust. In regulated sectors such as finance, healthcare, or government, such compromises could also lead to data privacy violations under GDPR if personal data is exposed or manipulated. The attack requires tricking an administrator, so organizations with less stringent user security awareness or lacking multi-factor authentication on admin accounts are at higher risk. Although no active exploitation is reported, the medium severity score and ease of exploitation without authentication make it a credible threat that could be leveraged in targeted attacks or automated scanning campaigns. The scope is limited to sites using this specific plugin, but given WordPress’s popularity in Europe, the potential impact is non-negligible.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the Last.fm Recent Album Artwork plugin is in use and verify the version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing strict administrative access controls, including multi-factor authentication and limiting admin privileges, can reduce the risk of successful exploitation. Educating administrators about phishing and social engineering risks is critical to prevent inadvertent triggering of CSRF attacks. Additionally, deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the vulnerable plugin endpoints can provide a temporary protective layer. Monitoring web server logs for unusual activity related to 'lastfm_albums_artwork.php' can help detect attempted exploitation. Once a patch is available, prompt application of updates is essential. Finally, adopting a security plugin that enforces nonce validation and CSRF protections site-wide can help prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-15T18:48:20.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad007439b4

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 8/16/2025, 4:04:56 AM

Last updated: 8/16/2025, 11:42:00 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats